<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE - 802.1x certificate authentication without identity lookup in in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351972#M599189</link>
    <description>&lt;P&gt;I know ISE is a beast though I would normally expect in CAP to simply say "don't validate identity" to keep it simple, though not simple as that.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Dec 2025 10:57:34 GMT</pubDate>
    <dc:creator>Martin Jelinek</dc:creator>
    <dc:date>2025-12-03T10:57:34Z</dc:date>
    <item>
      <title>ISE - 802.1x certificate authentication without identity lookup in AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351901#M599183</link>
      <description>&lt;P&gt;Hello everyone&lt;BR /&gt;&lt;BR /&gt;Does anyone has an experience with ISE (3.x) configuration related to 802.1x for wired clients connecting to network where identity lookup in AD shouldn't be done?&lt;/P&gt;&lt;P&gt;We have some specific use case for clients who are issued with certificate from internal PKI and there is a need to allow such clients to perform 802.1x authentication based on client (machine) certificate, but there is NO need for identity lookup in any store (not AD nor internal).&lt;/P&gt;&lt;P&gt;Basically client should just present valid certificate signed by internal PKI which is verified by ISE that certificate is valid/trusted and then run authorization policy to assing user into VLAN X.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Problem is that it looks that ISE always perform some kind of identity lookup which is taken e.g. from certificate CN or SAN entry etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any clue how to configure ISE policy or profile to NOT perform any identity lookup and simply accept client if presented certificate is valid/trusted? Can't see any option in Certificate auth profile for such a way.&lt;/P&gt;&lt;P&gt;In policy authorization policy it looks straighforward however from logs I can see identity lookup is always performed.&lt;/P&gt;&lt;P&gt;Thank you for any hint.&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 08:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351901#M599183</guid>
      <dc:creator>Martin Jelinek</dc:creator>
      <dc:date>2025-12-03T08:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351905#M599184</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/285453"&gt;@Martin Jelinek&lt;/a&gt;&amp;nbsp;is a CAP (Certificate Authentication Profile) used which is performing lookup to AD?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 08:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351905#M599184</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-12-03T08:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351912#M599185</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Although not a common scenario, you should be able to make it work as follows:&lt;/P&gt;
&lt;P&gt;1. Ensure your CAP / Certificate Authentication Profile does not rely on AD for the authentication phase; when you create the CAP, leave the Identity field empty, to prevent ISE from performing an AD query/lookup; also ensure that "Binary Comparison" option is unchecked, to also prevent ISE perform AD lookup during authentication phase; ensure to configure which certificate attribute / field you want ISE to use as Identity, ideally pick something which is not specific to an endpoint (like CN or SAN), rather pick a filed which has the same value for all certificate issued to any endpoint.&lt;/P&gt;
&lt;P&gt;2. When configuring authorization policy, ensure you don't use AD lookup as condition, rather use a certificate match criteria that matches on whatever certificate attribute you've mentioned in previous step as Identity.&lt;/P&gt;
&lt;P&gt;Least but not last, ensure that the building the above, you're not matching on other requests that might reach ISE, so you're not accidentally authenticating and authorising other endpoint as well.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 14:50:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351912#M599185</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2025-12-03T14:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351965#M599188</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My CAP is configured as per attachment and there is no option to "exclude" such AD lookup as far as I can tell..&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinJelinek_0-1764758549624.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/256186iC69C6CE473487793/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MartinJelinek_0-1764758549624.png" alt="MartinJelinek_0-1764758549624.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;However, even though I can see in log entries that processing is trying to query domain for an identity check:&lt;/P&gt;&lt;TABLE border="0" cellpadding="3"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;24209&lt;/TD&gt;&lt;TD&gt;Looking up Endpoint in Internal Endpoints IDStore - xxxxxx-yyyyy-zzzz-aaaaa&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24211&lt;/TD&gt;&lt;TD&gt;Found Endpoint in Internal Endpoints IDStore&lt;/TD&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Radius.Service-Type&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Radius.NAS-Port-Type&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24433&lt;/TD&gt;&lt;TD&gt;Looking up machine in Active Directory -xxxxxx-yyyyy-zzzz-aaaaa&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24325&lt;/TD&gt;&lt;TD&gt;Resolving identity&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24313&lt;/TD&gt;&lt;TD&gt;Search for matching accounts at join point&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24318&lt;/TD&gt;&lt;TD&gt;No matching account found in forest&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24322&lt;/TD&gt;&lt;TD&gt;Identity resolution detected no matching account&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24352&lt;/TD&gt;&lt;TD&gt;Identity resolution failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24437&lt;/TD&gt;&lt;TD&gt;Machine not found in Active Directory&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - AD1.ExternalGroups&lt;/TD&gt;&lt;TD&gt;19&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - AD1.ExternalGroups&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Please note that obviously we use ISE and AD integration for other use cases so identity check is required normally, but trying to fit in with other use case to simply authorize specific clients based on certificate attribute (SAN entry) to verify just validity/trust of such client based on certificate and if so, than authorization policy should assign correct VLAN for the client...&lt;/P&gt;&lt;P&gt;I don't have policy rule with condition to refer to AD lookup. Well at least not that i would be aware of. &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 10:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351965#M599188</guid>
      <dc:creator>Martin Jelinek</dc:creator>
      <dc:date>2025-12-03T10:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351972#M599189</link>
      <description>&lt;P&gt;I know ISE is a beast though I would normally expect in CAP to simply say "don't validate identity" to keep it simple, though not simple as that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 10:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5351972#M599189</guid>
      <dc:creator>Martin Jelinek</dc:creator>
      <dc:date>2025-12-03T10:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5352056#M599201</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Your CAP looks good per what you're trying to achieve, not mentioning AD in Identity Store field, means no AD lookup.How do your authentication and authorization policies look like for the goal you have in place? Do you have an active client to test with and check results / logs?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 14:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5352056#M599201</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2025-12-03T14:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5352261#M599211</link>
      <description>&lt;P&gt;Hi, yes I have a client to test this policy with and I can always see in log details (steps) involving identity lookup which shouldn't be happening, to my understanding.&lt;BR /&gt;&lt;BR /&gt;Policy is quite simple.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Policy matching criteria is based on Wired_802.1X using TLS so client and server (ISE) needs to trust each other.&lt;/P&gt;&lt;P&gt;In authentication part there is "Network Access:AuthenticationMethod = x509_PKI" checking content of the SAN entry within certificate presented by client. The authentication part looks to succeed..&lt;/P&gt;&lt;TABLE border="0" cellpadding="3"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;22070&lt;/TD&gt;&lt;TD&gt;Identity name is taken from certificate attribute&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;22037&lt;/TD&gt;&lt;TD&gt;Authentication Passed&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12506&lt;/TD&gt;&lt;TD&gt;EAP-TLS authentication succeeded&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;And within Authorization part, it looks matching rule is missed. Though, still it jsut check SAN entry for specific content and doing "Network Access: EapAuthentication = EAP-TLS" with specic authorization results to assign such client to vlan X.&lt;/P&gt;&lt;P&gt;It is just that simple and that is why I'm not sure where it Identity lookup is comming from as I have not specified it to what I can tell &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; So either, ISE always tries to do identity lookup and has no influence on the actual processing result or it does influence result somehow while using TLS and 802.1X.&lt;/P&gt;&lt;TABLE border="0" cellpadding="3"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;15036&lt;/TD&gt;&lt;TD&gt;Evaluating Authorization Policy&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24209&lt;/TD&gt;&lt;TD&gt;Looking up Endpoint in Internal Endpoints IDStore -&lt;SPAN&gt;xxxxxx-yyyyy-zzzz-aaaaa&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24211&lt;/TD&gt;&lt;TD&gt;Found Endpoint in Internal Endpoints IDStore&lt;/TD&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Radius.Service-Type&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Radius.NAS-Port-Type&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24433&lt;/TD&gt;&lt;TD&gt;Looking up machine in Active Directory -&lt;SPAN&gt;xxxxxx-yyyyy-zzzz-aaaaa&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24325&lt;/TD&gt;&lt;TD&gt;Resolving identity&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24313&lt;/TD&gt;&lt;TD&gt;Search for matching accounts at join point&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24318&lt;/TD&gt;&lt;TD&gt;No matching account found in forest&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24322&lt;/TD&gt;&lt;TD&gt;Identity resolution detected no matching account&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24352&lt;/TD&gt;&lt;TD&gt;Identity resolution failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24437&lt;/TD&gt;&lt;TD&gt;Machine not found in Active Directory&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 07:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5352261#M599211</guid>
      <dc:creator>Martin Jelinek</dc:creator>
      <dc:date>2025-12-04T07:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5352335#M599219</link>
      <description>&lt;P&gt;It could be the SAN check you're doing on the authorization rule that is causing ISE to go and check that identity in the AD. The "not applicable" option you rightly selected in the CAP affects only authentication, it has nothting to do with authroization. I would suggest to try to remove the SAN check on the authorization rule for testing, and if that resolves the issue then probably you would need to find another way to trying to match specific clients.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 11:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5352335#M599219</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-12-04T11:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5352378#M599220</link>
      <description>&lt;P&gt;I can give a try, though this would be quite unfortunate as Windows 11 are by nature manage through EntraID and therefore are not part of internal domain ISE uses for identity lookups...That is the reason why we are looking into verification of the certificate and specific SAN content with hope ISE will not do identity lookup! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Otherwise it might be quite difficult to find anything else as certificate is the thing to be used for client validation without AD identity lookup.&lt;/P&gt;&lt;P&gt;I can try to test next week hopefully &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; Worst case I can crosscheck with TAC if assumption is correct or not. Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 13:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5352378#M599220</guid>
      <dc:creator>Martin Jelinek</dc:creator>
      <dc:date>2025-12-04T13:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5353607#M599248</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Since SAN is the actual identity, within your authorization rule, can you replace SAN check with some other certificate attribute check?&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;The other solution would be to use a non-unique / more generic certificate attribute &amp;nbsp;(other than SAN) within your CAP and use the same attribute within your ISE authentication policy; afterwards use SAN within your ISE authorization policy. This should give you a solution for what you're looking to achieve, while also keeping the required flexibility of matching on SAN for the authorization policy.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 20:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5353607#M599248</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2025-12-09T20:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - 802.1x certificate authentication without identity lookup in</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5353709#M599250</link>
      <description>&lt;P&gt;I will be able to test hopefully next week, though SAN entry is natural choice as that is something our PKI is prepared for to specifically change for certain clients. Think I can use other certificate attribute like Certificate Template used which would be more generic, however require some redo on PKI side of things as template is generic and used for all clients while SAN entry can be easily changed per client. Not everything I have permissions on so it would take some time.&lt;/P&gt;&lt;P&gt;Hopefully ISE checks identity only in case certificate attribute like CN,SAN is used by default. Which I would hope for is not the case and I can control behavior by configuration if identity should be checked or not. Let's see.&lt;/P&gt;&lt;P&gt;Thank you so far for all advices &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Appreciate.&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 05:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-802-1x-certificate-authentication-without-identity-lookup-in/m-p/5353709#M599250</guid>
      <dc:creator>Martin Jelinek</dc:creator>
      <dc:date>2025-12-10T05:56:41Z</dc:date>
    </item>
  </channel>
</rss>

